A New Design and Implementation of Block Cipher Module Using Simple Encryption Technique

A TimeLine Approach

  • poorva shukla rgpv


Number of aspects related to security like so many applications ranging from E-commerce, payments gateways .But there are so many hackers tools are available which breaks the security concern. For that purpose our main focus is secures transmission of information that is possible with the help of cryptography. Cryptography is very necessary for secure transmission of our personal data or we can say information. Now cryptography itself is not sufficient for secure for secure transmission of information .our works presents on encryption /Decryption that is we have called cryptography. The Encryption and decryption techniques are able to work publically or privately or with any type of secure file. It can work on image file, text data file, audio/video file, power point presentation file and so on…..
The Encryption /Decryption technique or cryptography is one of key generation method of randomization .If we want to create a encryption key for any type of information but result for that key is only in binary format. To create a Key we use a simple mathematical operation like matrix and substitution of bits which can be applied on each block of information. The key generation and encryption are very transparent to the user. Now the process is used to decrypt the encrypted binary file.


Download data is not yet available.


[1] R. Chandramouli, “Battery power-aware encryp¬tion,” ACM Transactions on Information and Sys¬tem Security (TISSEC), vol. 9, no. 2, pp. 162-180, May 2006.
[2] D. Coppersmith, “The data encryption standard (DES) and its strength against attacks,” IBM Jour¬nal of Research and Development, pp. 243 -250, May 1994.
[3] J. Daemen, and V. Rijmen, “Rijndael: The advanced encryption standard,” Dr. Dobb’s Journal, pp. 137¬139, Mar. 2001.
[4] P. Ding, “Central manager: A solution to avoid de¬nial of service attacks for wreless LANs,” Interna¬tional Journal of Network Security, vol. 4, no. 1, pp. 35-44, 2007.
[5] N. E. Fishawy, “Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms,” International Journal of Network Security, pp. 241-251, Nov. 2007.
[6] Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005. International Journal of Network Security, Vol.10, No.3, PP.213–219, May 2010
[7] S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, Apr. 9,2003, Retrieved Oct. 1, 2008. (http://portal.acm.org/citation.cfm?id=383768)
[8] M. S. Hwang and C. Y. Liu, “Authenticated encryp¬tion schemes: current status and key issues,” Inter¬national Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
[9] M. H. Ibrahim, “A method for obtaining deni¬able public-key encryption,” International Journal of Network Security, vol. 8, no. 1, pp. 1-9, 2009.
[10] M. H. Ibrahim, “Receiver-deniable public-key en¬cryption,” International Journal of Network Secu¬rity, vol. 8, no. 2, pp. 159-165, 2009.
[11] S. Z. S. Idrus, and S. A. Aljunid, “Performance anal¬ysis of encryption algorithms text length size on web browsers,” IJCSNS International Journal of Com¬puter Science and Network Security, vol. 8, no.1, pp. 20-25, Jan. 2008.
[12] K. McKay, Trade-offs between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005.
[13] K. Naik, “Software implementation strategies for power-conscious systems,” Mobile Networks and Ap-plications, vol. 6, pp. 291-305, 2001.
[14] P. Ruangchaijatupon, and P. Krishnamurthy, “En-cryption and power consumption in wireless LANs-N,” The Third IEEE Workshop on Wireless LANs, pp. 148-152, Newton, Massachusetts, Sep. 27-28, 2001.
[15] B. Schneier, The Blowfish Encryption Algo¬rithm, Retrieved Oct. 25, 2008. (http://www. schneier.com/blowfish.html)
[16] A. Sinha, A. P. Chandrakasan, and JouleTrack, “A web based tool for software energy profiling,” Pro¬ceedings of the 38th Design Utomation Conference, pp. 220-225, DAC Las Vega, US, 2001.
[17] W. Stallings, Cryptography and Network Security, Prentice Hall, pp. 58-309, 4th Ed, 2005.
[18] A. A. Tamimi, Performance Analysis of Data Encryption Algorithms, Retrieved Oct. 1, 2008. (http://www.cs.wustl.edu/∼jain/cse567-06/ftp/ encryption perf/index.html)
[19] A. Nadeem, “A performance comparison of data en-cryption algorithms,” IEEE Information and Com-munication Technologies, pp. 84-89, 2006.
[20] Results of Comparing Tens of Encryption Algorithms Using Different Settings-Crypto++ Benchmark, Re¬trieved Oct. 1, 2008. (http://www.eskimo.com/ wei-dai/benchmarks.html)

[a] http://www.garykessler.net/library/crypto.html
[b] http://www.cryptographyworld.com/what.htm
[c] http://www.ibm.com/developerworks/library/s-crypt02.html
[e]. http://www.encryptionanddecryption.com/
[f].http://www.encryptionanddecryption.com/algorithms/ symmetric_algorithms.html
[g]http://www.omnisecu.com/security/public-key- infrastructure/public-key-cryptography.htm
How to Cite
SHUKLA, poorva. A New Design and Implementation of Block Cipher Module Using Simple Encryption Technique. International Journal of Research and Engineering, [S.l.], v. 4, n. 7, p. 194-199, sep. 2017. ISSN 2348-7860. Available at: <https://digital.ijre.org/index.php/int_j_res_eng/article/view/273>. Date accessed: 28 mar. 2020.